cn topic 9

20
Topic 9 - Firewalls Computer Networks V1.0 Visuals Handout Page 1 © NCC Education Limited V1.0 Computer Networks Topic 9: Firewalls © NCC Education Limited V1.0 Computer Networks Topic 9 Lecture 1: Functions of a Firewall Firewalls Topic9 -9.3 Scope and Coverage This topic will cover: • Functions of a fi rewall Types of f ire wal l © NCC Education Limited V1.0  

Upload: sarge-chisanga

Post on 02-Jun-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 1/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 1

© NCC Education LimitedV1.0

Computer Networks

Topic 9:

Firewalls

© NCC Education LimitedV1.0

Computer Networks

Topic 9 – Lecture 1:Functions of a Firewall

Firewalls Topic9 -9.3

Scope and CoverageThis topic will cover:

• Functions of a firewall

• Types of firewall

© NCC Education LimitedV1.0

 

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 2/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 2

Firewalls Topic9 -9.4

Learning Outcomes

By the end of this topic, students will be able to:• Describe the functions of a firewall

• Describe different types of firewall

• -

© NCC Education LimitedV1.0

 

connected system

Firewalls Topic9 -9.5

What is a Firewall?

• In the industrial world, it is a solid wall that has

been built to contain a fire

 – For example, an area of a chemical plant will have

a firewall to contain an fire that ma break out.

© NCC Education LimitedV1.0

• In computing, a firewall is built to protect a

network.• The aim is to protect the network from malicious

traffic.

Firewalls Topic9 -9.6

Network Firewall• A firewall is the first line of defence for your

network.

• The purpose of a firewall is to keep intruders from

gaining access to your network.

© NCC Education LimitedV1.0

• sua y p ace at t e per meter o networ to act as

a gatekeeper for incoming and outgoing traffic

• It protects your computer from Internet threats by

erecting a virtual barrier between your network or

computer and the Internet

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 3/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 3

Firewalls Topic9 -9.7

How Does a Firewall Work?

• Examines the traffic sent between two networks

 – e.g. examines the traffic being sent between your

network and the Internet

• Data is examined to see if it appears legitimate:

© NCC Education LimitedV1.0

 – if so, the data is allowed to pass through

 – If not, the data is blocked

• A firewall allows you to establish certain rules to

determine what traffic should be allowed in or out

of your private network.

Firewalls Topic9 -9.8

What Are The Rules?

• Each organisation has to decide on the level of

security they require

 – There is no “one size fits all” solution

• Firewalls can be configured to allow or block traffic

© NCC Education LimitedV1.0

based upon rules.

• Software firewalls often come with a set of

preconfigured options based upon the securitylevel required.

• Can usually be configured rule by rule

Firewalls Topic9 -9.9

What to Block• Traffic blocking rules can be based upon:

 – Words or phrases

 – Domain names

 – IP addresses

© NCC Education LimitedV1.0

 

 – Ports

 – Protocols (e.g. FTP)

• While firewalls are essential, they can block

legitimate transmission of data and programs.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 4/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 4

Firewalls Topic9 -9.10

Words, Phrases & Domain Names

• Lists of words and phrases that are not allowed can

be used to block traffic

 – There can be problems when a legitimate word

contains a blocked word within it.

© NCC Education LimitedV1.0

• Similarly, lists of domain names can be used to

block traffic

 – Could be a blocked list where access is prevented

 – Could be an allowed list and access is only allowed

to domains on the list and nothing else

Firewalls Topic9 -9.11

IP Addresses & Ports

• A firewall typically filters information by examining

I.P. addresses and port information.

• The firewall can determine which ports and I.P.

addresses are normal.

© NCC Education LimitedV1.0

• It keeps a list of situations that are suspicious.

• If something looks suspicious, it will stop the flow of

data.

Firewalls Topic9 -9.12

Source & Destination IP Address - 1• Some firewalls can filter traffic based on source or

destination IP address.

• Enables you to allow or deny traffic based on the

computers or networks that are sending or receiving

the traffic

© NCC Education LimitedV1.0

 – an con gure rewa s o oc spec c we s es

 – Can allow/deny traffic based on the sending

computer 

 – Can disable a protocol on one set of computers and

allow the same protocol on a different set of

computers

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 5/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 5

Firewalls Topic9 -9.13

Source & Destination IP Address - 2

• Allows you to give greater access to users on

internal networks than those on external networks

 – Common to use a firewall to block all requests sent

to an internal email server except those requests

© NCC Education LimitedV1.0

 

• Can also use source filtering to block all requests

from a specific address

 – e.g. to block traffic from an IP address identified as

having attacked the network

Firewalls Topic9 -9.14

Protocols

• Firewalls can also filter traffic based on protocol

 – this option is not usually enabled by default.

• This allows an organisation to block all traffic of a

particular type

© NCC Education LimitedV1.0

 – A business might have a firewall block HTTP traffic

to prevent employees from accessing the Internet

while at work.

 – A business may block all FTP traffic to prevent files

being uploaded or downloaded.

Firewalls Topic9 -9.15

Common Firewall Types• In general, there are software firewalls and

hardware firewalls

 – Even in home networks

© NCC Education LimitedV1.0

  ,

which distribute incoming traffic from an Internet

connection to computers.

• Software firewalls reside in individual computers.

• Ideally, a network should have both.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 6/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 6

Firewalls Topic9 -9.16

Software Firewall

• Protects only the computer on which they areinstalled

• Provides excellent protection against threats

(viruses, worms, etc.)

© NCC Education LimitedV1.0

• Has a user-friendly interface

• Has flexible configuration

Firewalls Topic9 -9.17

Router Firewall

• Protects your entire network or part of a network

• Located on your router 

• Protects network hardware which cannot have a

software firewall installed on it

© NCC Education LimitedV1.0

• Allows the creation of network-wide rules that

govern all computers on the network

Firewalls Topic9 -9.18

Do You Need a Firewall?• The answer is always YES

 – Unless you never connect to an outside network

• Firewalls are a critical part of Internet security.

© NCC Education LimitedV1.0

 

software firewall.

• Firewalls can be found in all commercial Internet

security suites.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 7/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 7

© NCC Education LimitedV1.0

Computer Networks

Topic 9 – Lecture 2:

Types of Firewall

Firewalls Topic9 -9.20

Types of Firewall

• Can be divided into three main types:

 –  Packet filters

 –  Application gateways

 –  Packet ins ection

© NCC Education LimitedV1.0

 

• Individual vendors of firewalls may provide

additional features – You should look at their products for details

Firewalls Topic9 -9.21

What do Packet Filters Examine?• Packet-filtering firewalls validate individual packets

based on:

 – Protocol

 – Source and/or destination IP address

© NCC Education LimitedV1.0

 – Source and/or destination port numbers

 – Time range

 – Type of service (ToS)

 – Various other parameters within the IP header

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 8/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 8

Firewalls Topic9 -9.22

 Access Control Lists

• Packet filtering is generally accomplished using Access Control Lists (ACL) on routers or switches.

• Normall ver fast

© NCC Education LimitedV1.0

 – Traffic enters or exits an interface

 – ACLs are used to match selected criteria

 – Either permit or deny individual packets

Firewalls Topic9 -9.23

 Advantages of Packet Filters

• Big advantage is that they are present in many

networked devices

• Packet-filtering firewalls are located in:

 – Routers

© NCC Education LimitedV1.0

 – Switches

 – Wireless access points• Routers have the capability to control the flow of

packets through the use of ACLs

Firewalls Topic9 -9.24

Does My Network Use Packet Filters?• Almost certainly (or it should!)

• These devices do not have lots of features.

• But when you need to quickly implement a security

olic , this ma be the uickest solution to de lo :

© NCC Education LimitedV1.0

 – to mitigate an attack

 – protect against infected devices

 – etc.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 9/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 9

Firewalls Topic9 -9.25

Problems With Packet Filters

• Packet filtering can be circumvented in a number of

ways including:

 – Misrepresenting traffic using well-known port

numbers

© NCC Education LimitedV1.0

 – Tunnelling traffic unsuspectingly within traffic

allowed by the ACL rules

• It was quickly discovered that peer-to-peer sharing

applications could use port 80 (HTTP) to gain

access through the firewall.

Firewalls Topic9 -9.26

Using Packet Filters

• Packet filters alone are insufficient

• Multiple devices can provide defence in depth

• Packet filtering is best used on the outer edge of

our network

© NCC Education LimitedV1.0

• Can prevent spoofed traffic and private IP

addresses from entering or exiting your network

Firewalls Topic9 -9.27

The OSI Application Layer • Application Gateways, or Application Layer

Firewalls, work at the application layer of the OSI

model.

• Layer 7, the application layer 

© NCC Education LimitedV1.0

 – It is the user interface to your computer (the

programs), for example, word processor, email

application, telnet, and so on.

• We include “proxies” in this category of firewalls.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 10/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 10

Firewalls Topic9 -9.28

 Application Gateways

• Application-layer firewalls can understand the

traffic flowing through them and allow or deny

traffic based on the content.

• Host-based firewalls designed to block

© NCC Education LimitedV1.0

 

a form of application-layer firewall.

• Application-layer firewalls can inspect packets

bound for an internal Web server to ensure the

request isn’t really an attack in disguise.

Firewalls Topic9 -9.29

Proxies

• A proxy device may be dedicated hardware (e.g. a

server) or software.

• Acts as a firewall by responding to input packets

(connection requests, for example) in the manner

© NCC Education LimitedV1.0

  ,

• Make tampering with an internal system from the

external network more difficult• Act on behalf of a client so they provide an

additional buffer to the network

Firewalls Topic9 -9.30

 Advantages

• Provide a buffer from port scans and application

attacks

 – If an attacker finds a vulnerability in an application,

the attacker would have to compromise the

application/proxy firewall before attacking devices

© NCC Education LimitedV1.0

behind the firewall

• Can be patched quickly in the event of a

vulnerability being discovered

 – This may not be true for patching all the internal

devices

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 11/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 11

Firewalls Topic9 -9.31

Disadvantages

• Needs to know how to handle traffic to and from

your specific application – If you have an application that's unique, your proxy

firewall may not be able to support it without making

some significant modifications

© NCC Education LimitedV1.0

• Application firewalls are generally much slower

than packet-filtering or packet-inspection firewalls

 – They run applications, maintain state for both the

client and server, and also perform inspection of

traffic

Firewalls Topic9 -9.32

Packet Inspection Firewalls

• Examine the session information between devices:

 – Protocol

 – New or existing connection

 – Source IP address

© NCC Education LimitedV1.0

 – Destination IP address

 – Port numbers

 – IP checksum

 – Sequence numbers

 – Application-specific information

Firewalls Topic9 -9.33

Outbound Internet Traffic• Client initiates connection to IP address of the web

server destined for port 80 (HTTP)

• Firewall determines whether that packet is allowed

through the firewall based on the current rule-set

© NCC Education LimitedV1.0

and determines whether it is legitimate HTTP traffic

• If all the requirements are met, a flow entry is

created in the firewall based on the session

information, and that packet is allowed to pass.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 12/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 12

Firewalls Topic9 -9.34

Inbound Internet Traffic

• Web server receives the packet and responds• Return traffic is received by the firewall

• Firewall determines if return traffic is allowed by

comparing the session information with the

© NCC Education LimitedV1.0

information contained in the local translation table

• If return traffic matches the previous requirements,

payload is inspected to validate appropriate HTTP

• Then it is forwarded to the client

Firewalls Topic9 -9.35

 Advantages

• Generally much faster than application firewalls

 – They are not required to host client applications

• Most of the packet-inspection firewalls today also

offer deep-packet inspection

© NCC Education LimitedV1.0

 – The firewall can dig into the data portion of the

packet and also:

 – Match on protocol compliance

 – Scan for viruses

 – Still operate very quickly

Firewalls Topic9 -9.36

Disadvantages• Open to certain denial-of-service attacks

• These can be used to fill the connection tables with

ille itimate connections.

© NCC Education LimitedV1.0

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 13/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 13

Firewalls Topic9 -9.37

Network Address Translation (NAT)

• Firewalls often have NAT functionality• Hosts behind a firewall commonly have addresses

in a private address range.

• Hides the true address of protected hosts

© NCC Education LimitedV1.0

• Hiding the addresses of protected devices is a

defence against network reconnaissance.

© NCC Education LimitedV1.0

Computer Networks

Topic 9 – Lecture 3:Installing and Configuring a Firewall

Firewalls Topic9 -9.39

Planning the Firewall• A number of factors must be considered before

purchasing and installing a firewall or firewalls:

 – Firewall policy

 – Risk analysis

© NCC Education LimitedV1.0

 – Identifying requirements

 – Creating rules

 – Managing the firewall

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 14/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 14

Firewalls Topic9 -9.40

Firewall Policy

• Defines how an organisation’s firewalls should

handle inbound and outbound network traffic,

based on the organisation’s information security

policies, for:

© NCC Education LimitedV1.0

 –

 – IP address ranges

 – Protocols

 – Applications

 – Content types

Firewalls Topic9 -9.41

Risk Analysis

• Organisations should conduct risk analysis to

develop a list of:

 – The types of traffic needed by the organisation

 – How they must be secured

© NCC Education LimitedV1.0

 –

• All inbound and outbound traffic not expresslypermitted should be blocked.

• This reduces the risk of attack and can decrease

the volume of traffic on the network.

Firewalls Topic9 -9.42

Identifying Requirements• Which network areas need to be protected?

• Which firewall technologies will be most effective

for the types of traffic that require protection?

• Integrating the firewall into existing network and

© NCC Education LimitedV1.0

security infrastructures

• Requirements relating to physical environment and

personnel

• Consideration of possible future needs

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 15/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 15

Firewalls Topic9 -9.43

Creating Rules

• Implement the firewall policy and support firewallperformance

• Rulesets should be as specific as possible with

re ards to the network traffic the control:

© NCC Education LimitedV1.0

 – Types of traffic

 – Protocols

• The details of creating rulesets vary widely by type

of firewall and specific products.

Firewalls Topic9 -9.44

Managing the Firewall

• Policy rules need to be updated as the

organisation’s requirements change.

• Firewall performance needs to be monitored.

• Logs and alerts should also be continuously

© NCC Education LimitedV1.0

  .

• Rulesets and policies should be managed by a

formal change management control process.• Firewall software should be patched as vendors

provide updates to address vulnerabilities.

Firewalls Topic9 -9.45

Small Networks• Firewalls at a network’s perimeter provide some

measure of protection for internal hosts.

• Network firewalls are not able to recognise all

forms of attack, some reach internal hosts.

© NCC Education LimitedV1.0

not even pass through a network firewall.

• Network designers include firewall functionality at

places other than the network perimeter to provide

an additional layer of security.

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 16/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 16

Firewalls Topic9 -9.46

Host Based Firewalls - 1

• Firewalls for servers and personal firewalls fordesktop and laptop computers

• Provide an additional layer of security

• Software-based, residing on the hosts they are

© NCC Education LimitedV1.0

protecting

• Monitor and control the incoming and outgoing

network traffic for a single host

Firewalls Topic9 -9.47

Host Based Firewalls - 2

• May come with OS

• Can be installed as third-party add-on

• Perform logging

• Can be confi ured to erform address-based and

© NCC Education LimitedV1.0

application-based access controls

• Can also act as intrusion prevention systems that

detect an attack in progress and take action to

prevent damage to the targeted host

Firewalls Topic9 -9.48

Demilitarised Zones (DMZ) - 1• Traffic moving between the DMZ and other

interfaces on the protected side of the firewall still

goes through the firewall

• This traffic has firewall protection policies applied

© NCC Education LimitedV1.0

• Common to put public-facing servers on the DMZ:

 – Web servers

 – Email servers

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 17/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 17

Firewalls Topic9 -9.49

Demilitarised Zones (DMZ) - 2

© NCC Education LimitedV1.0

Firewalls Topic9 -9.50

Multiple Firewall Layers

• Firewalls should be at the edge of a logical network

boundary.

• A network administrator may wish to have

additional boundaries within the network.

© NCC Education LimitedV1.0

• Can deploy additional firewalls to establish such

boundaries

• The use of multiple layers of firewalls is quite

common to provide defence-in-depth.

Firewalls Topic9 -9.51

Many Layers of Trust• Internal users may have varying levels of trust

 – Accounting databases may only allow access by

members of the accounting department

 – Many organisations deploy specific wireless access

© NCC Education LimitedV1.0

points within their networks for visitor use

• Have one firewall at the edge of the network and

another at the edge of the internal network that has

extra protection

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 18/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 18

Firewalls Topic9 -9.52

Problems with Multiple Layers

• Increased difficulty in tracing firewall problems

• Multiple layers of application/proxy gateways is

problematic as each can change a message, which

© NCC Education LimitedV1.0

makes debugging even more difficult.

Firewalls Topic9 -9.53

Planning and Implementation

The lifecycle is:

1. Plan

2. Configure

© NCC Education LimitedV1.0

.

4. Deploy

5. Manage

Firewalls Topic9 -9.54

Plan• Should consider:

 – Security Capabilities

 – Management

 – Performance

© NCC Education LimitedV1.0

 – Integration

 – Physical Environment

 – Personnel

 – Future Needs

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 19/20

Topic 9 - Firewalls Computer Networks

V1.0 Visuals Handout – Page 19

Firewalls Topic9 -9.55

Configure

• This includes: – Installing hardware

 – Installing software

 – Configuring policies

© NCC Education LimitedV1.0

 – Configuring logging and alerting

 – Integrating the firewall into the network architecture

• The details of creating a ruleset vary by type of

firewall and specific products.

Firewalls Topic9 -9.56

Test

• A number of features should be tested:

 – Connectivity

 – Ruleset

 – Application compatibility

© NCC Education LimitedV1.0

 – anagemen

 – Logging

 – Performance

 – Interoperability

 – Any additional features

Firewalls Topic9 -9.57

Deploy

• Administrators should notify users of the planned

deployment

• Involves integrating the firewall with other network

elements

• Has to be integrated into the routing structure

© NCC Education LimitedV1.0

• Can mean changing the routing tables for other

routers in the network

• If elements in the network use dynamic routing,

they may need to have their configuration

modified

8/11/2019 CN Topic 9

http://slidepdf.com/reader/full/cn-topic-9 20/20

Topic 9 - Firewalls Computer Networks

Firewalls Topic9 -9.58

Manage

• The longest lasting phase• Managing the solution involves maintaining:

 – Firewall architecture

 – Policies

© NCC Education LimitedV1.0

 – Software

 – Other components of the solution

• Review the firewall policy at regular intervals

Firewalls Topic9 -9.59

References

• Price B. (ed) (2003). Networking Complete, 3rd

edition, Sybex.

• Tanenbaum, A.S. & Weatherall, D.J. (2010).

Computer .Networks, 5th edition, Pearson

© NCC Education LimitedV1.0

Education.

Firewalls Topic9 -9.60

Topic 9 – Firewalls

© NCC Education LimitedV1.0

 Any Questions?